Hello all:

I have been told that it is possible to identify a Checkpoint Firewall's
operating system type, build and version type from the outside by examining
banners and using various fingerprinting techniques. How can a Checkpoint
firewall be protected against this vulnerability?

Andy


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to